Secret key decentralized storage method, intelligent terminal and storage medium
A decentralized storage and key technology, applied in key distribution, can solve the problems of low encryption algorithm security and easy leakage of important information, etc., and achieve the effect of enhancing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0049] The method for decentralized storage key described in the preferred embodiment of the present invention, such as figure 1 As shown, the method for decentralized storage key comprises the following steps:
[0050] Step S10, dynamically and randomly generating a plurality of modules for decentralized storage of keys.
[0051]Specifically, store random data combination A and random index table B in the source code file, and write it into the source file (encRandom Buffer.h), which is defined as the first module; generate 32 random data combinations, and randomly generate an index v...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

